Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Language-based Techniques for Practical and Trustworthy Secure Multi-party Computations.. University of Maryland, College Park, MD, USA, (2016)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/18541).Dijkstra monads for free., , , , , , , and . POPL, page 515-529. ACM, (2017)Celestial: A Smart Contracts Verification Framework., , , , and . FMCAD, page 133-142. IEEE, (2021)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)Enabling Memory Safety of C Programs using LLMs., , , , and . CoRR, (2024)Tutorials and Technical Briefings at ISEC 2019., and . ISEC, page 33:1-33:2. ACM, (2019)SteelCore: an extensible concurrent separation logic for effectful dependently typed programs., , , , , and . Proc. ACM Program. Lang., 4 (ICFP): 121:1-121:30 (2020)Hardening attack surfaces with formally proven binary format parsers., , , , , , , , , and . PLDI, page 31-45. ACM, (2022)ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code., , , , , , , , and . EuroSys, page 4:1-4:15. ACM, (2019)Meta-F ^: Proof Automation with SMT, Tactics, and Metaprograms., , , , , , , , , and 3 other author(s). ESOP, volume 11423 of Lecture Notes in Computer Science, page 30-59. Springer, (2019)